Interactive Proof System We Have Seen Interactive Proofs, in Various Disguised Forms, in the Definitions of NP, OTM, Cook Reduction and PH
Total Page:16
File Type:pdf, Size:1020Kb
Interactive Proof System We have seen interactive proofs, in various disguised forms, in the definitions of NP, OTM, Cook reduction and PH. We will see that interactive proofs have fundamental connections to cryptography and approximate algorithms. Computational Complexity, by Fu Yuxi Interactive Proof System 1 / 120 It was not until 1985 that the idea of computation through interaction was formally studied by two groups. 1. L. Babai, with a complexity theoretical motivation; 2. S. Goldwasser, S. Micali and C. Rackoff, with a cryptographic motivation. Computational Complexity, by Fu Yuxi Interactive Proof System 2 / 120 An interactive proof system consists of a Prover and a Verifier. 1. Prover’s goal is to convince Verifier of the validity of an assertion through dialogue. 2. Verifier’s objective is to accept/reject the assertion based on the information it gathers from the dialogue. Prover’s answers are adaptive. Adaptivity is the difference between a prover and an oracle. Computational Complexity, by Fu Yuxi Interactive Proof System 3 / 120 Synopsis 1. Introduction 2. Interactive Proof with Private Coins 3. Interactive Proof with Public Coins 4. Set Lower Bound Protocol 5. IP = PSPACE 6. Public Coins versus Private Coins 7. MIP = NEXP 8. Interactive Proof for Multilinear Function 9. IP vs MIP 10. Programme Checking Computational Complexity, by Fu Yuxi Interactive Proof System 4 / 120 Introduction Computational Complexity, by Fu Yuxi Interactive Proof System 5 / 120 Basic Principle A verifier’s job must be easy (polynomial time on input length), otherwise there is no need for any dialogue. A prover can be as powerful as it takes, as long as the answers it produces are short (polynomial size on input length). A verifier is not supposed to ask too many questions. Its best bet is ask random questions. A prover is supposed to provide an answer no matter what. Computational Complexity, by Fu Yuxi Interactive Proof System 6 / 120 Deterministic Verifier A k-round interaction of f and g on input x 2 f0; 1g∗, denoted by hf; gi(x), is the ∗ sequence a1;:::; ak 2 f0; 1g defined as follows: a1 = f(x); a2 = g(x; a1); . a2i+1 = f(x; a1;:::; a2i); for 2i < k a2i+2 = g(x; a1;:::; a2i+1); for 2i + 1 < k . The output of f at the end, noted outfhf; gi(x), is f(x; a1;:::; ak) 2 f0; 1g. f; g : f0; 1g∗ ! f0; 1g∗ are TM’s, and k(n) is a polynomial. Computational Complexity, by Fu Yuxi Interactive Proof System 7 / 120 Deterministic Proof System We say that a language L has a k-round deterministic proof system if there is a TM V that on input x; a1;:::; ak runs in poly(jxj) time, and can have a k(jxj)-round interaction with any TM P such that the following statements are valid: ∗ ∗ Completeness: x 2 L ) 9P : f0; 1g ! f0; 1g :outV(V; P) = 1; ∗ ∗ Soundness: x 2= L ) 8P : f0; 1g ! f0; 1g :outV(V; P) = 0: dIP contains languages with a polynomial round deterministic interactive proof system. Computational Complexity, by Fu Yuxi Interactive Proof System 8 / 120 Deterministic Proof Systems Define NP Fact. dIP = NP. Every NP language has a one-round deterministic proof system. Conversely suppose L 2 dIP. There is a P-time TM V such that ∗ ∗ x 2 L iff 9P : f0; 1g ! f0; 1g :outV(V; P) = 1 iff 9a1; a2;:::; ak:V(x) = a1 ^ V(x; a1; a2) = a3 ^ ::: ^ V(x; a1;:::; ak) = 1: The verification time is polynomial. In a deterministic proof system an almighty prover can predict the questions the verifier asks by running the verifier’s TM, and therefore can provide all answers at onego. Computational Complexity, by Fu Yuxi Interactive Proof System 9 / 120 Interaction + Randomness We shall only be interested in verifiers who ask clever questions. “…in the context of interactive proof systems, asking random questions is as powerful as asking clever questions.” Goldreich Computational Complexity, by Fu Yuxi Interactive Proof System 10 / 120 B has one red sock and one green sock. How can he convince A, who is color blind, that the socks are of different color? Computational Complexity, by Fu Yuxi Interactive Proof System 11 / 120 Interactive Proof with Private Coins Computational Complexity, by Fu Yuxi Interactive Proof System 12 / 120 S. Goldwasser, S. Micali, C. Rackoff. The Knowledge Complexity of Interactive Proofs. 1985. Computational Complexity, by Fu Yuxi Interactive Proof System 13 / 120 Private Coins Model The verifier generates an l-bits r by tossing coins: l r 2R f0; 1g : The verifier of course knows r: a1 = f(x; r); a3 = f(x; r; a1; a2);:::: The prover cannot see r: a2 = g(x; a1); a4 = g(x; a1; a2; a3);:::: Both the interaction hf; gi(x) and the output outfhf; gi(x) are random variables over l r 2R f0; 1g . Computational Complexity, by Fu Yuxi Interactive Proof System 14 / 120 IP, Interactive Proofs with Private Coins Suppose k is a polynomial. A language L is in IP[k(n)] if there’s a P-time PTM V that can have a k(jxj)-round interaction with any TM P and renders valid the following. Completeness. ∗ ∗ x 2 L ) 9P : f0; 1g ! f0; 1g :Pr[outV(V; P) = 1] ≥ 2=3: Soundness. ∗ ∗ x 2= L ) 8P : f0; 1g ! f0; 1g :Pr[outV(V; P) = 1] ≤ 1=3: S c The class IP is defined by c≥1 IP[cn ]. Computational Complexity, by Fu Yuxi Interactive Proof System 15 / 120 BPP Verifier, PSPACE Prover 1. A verifier is a BPP machine. 2. We may assume that a prover is a PSPACE machine. I There is an optimal prover. I A single PSPACE prover suffices for all x 2 L. An almighty prover knows Verifier’s algorithm. I Prover enumerates all answers a2; a4;:::, and uses Verifier’s algorithm to calculate the percentage of the random strings that make verifier to accept. Computational Complexity, by Fu Yuxi Interactive Proof System 16 / 120 IP, Interactive Proofs with Private Coins L 2 IP , there is an interactive proof system of a verifier V 2 BPP and a prover P 2 PSPACE that interact for a polynomial round and renders valid the following. Completeness. x 2 L ) Pr[outV(V; P) = 1] ≥ 2=3: Soundness. x 2= L ) Pr[outV(V; P) = 1] ≤ 1=3: Computational Complexity, by Fu Yuxi Interactive Proof System 17 / 120 IP ⊆ PSPACE Proposition. IP ⊆ PSPACE. Both a PSPACE machine and a BPP machine can be simulated in polynomial space. Computational Complexity, by Fu Yuxi Interactive Proof System 18 / 120 Robustness of IP Fact. IP remains unchanged if we replace the completeness parameter 2=3 by 1 − 2−ns and soundness parameter 1=3 by 2−ns . Proof. Repeat the protocol O(ns) times. Majority rule. Chernoff bound. Since there is an optimal prover, it doesn’t matter if a protocol is repeated sequentially or in parallel. Computational Complexity, by Fu Yuxi Interactive Proof System 19 / 120 Robustness of IP Fact. Allowing prover to use a private coin does not change IP. By average principle we can construct a deterministic prover from a probabilistic prover that is as good as the latter. Computational Complexity, by Fu Yuxi Interactive Proof System 20 / 120 Perfect Completeness An interactive proof system has perfect completeness if its completeness parameter is 1. An interactive proof system has perfect soundness if its soundness parameter is 0. Computational Complexity, by Fu Yuxi Interactive Proof System 21 / 120 Perfect Soundness is Too Strong 1. IP with Perfect Completeness = IP. 2. IP with Perfect Soundness = NP. 1. IP ⊆ PSPACE. A problem in IP is Karp reducible to TQBF. TQBF has an interactive proof system with perfect completeness (using the Sumcheck protocol). 2. If x 2 L, there exists a ‘yes’ certificate. If x 2= L, the verifier always says ‘no’. Computational Complexity, by Fu Yuxi Interactive Proof System 22 / 120 Graph Non-Isomorphism Let GI be the Graph Isomorphism problem; it is not known to be in P. Let GNI = GI, it is not known to be in NP. The nodes of a graph are represented by the numbers 1; 2;:::; n. The isomorphism of G0 to G1 is indicated by π(G0) = G1, where π is a permutation of the nodes of G0. Computational Complexity, by Fu Yuxi Interactive Proof System 23 / 120 Graph Non-Isomorphism Protocol Protocol: Graph Non-Isomorphism V: Pick i 2R f0; 1g. Generate a random permutation graph H of Gi. Send H to P. P: Identify which of G0; G1 was used to produce H and send the index j 2 f0; 1g to V. V: Accept if i = j; reject otherwise. Computational Complexity, by Fu Yuxi Interactive Proof System 24 / 120 Graph Non-Isomorphism Theorem. GNI 2 IP. Proof. If G0 ' G1, the prover’s guess is as good as anyone’s guess. If G0 6' G1, the prover can force the verifier to accept. 1. O. Goldreich, S. Micali, A. Wigderson. Proofs that Yield Nothing but Their Validity and a Methodology of Cryptographic Protocol Design. FOCS 1986. Computational Complexity, by Fu Yuxi Interactive Proof System 25 / 120 Quadratic Non-Residuosity A number a is a quadratic residue modulo p if there is some number b such that a ≡ b2 (mod p). I QR = f(a; p) j p is prime and 9b:a ≡ b2 (mod p)g is in NP. Let QNR = QR. The problem QNR is not known to be in NP. Computational Complexity, by Fu Yuxi Interactive Proof System 26 / 120 Quadratic Non-Residuosity Protocol Input. 1. An odd prime number p and a number a.